Systems and methods for detecting a security breach in a computer system

a technology of computer system and security breach, applied in the field of systems and methods for detecting security breaches in computer systems, can solve problems such as computer system damage, security process raise alarm,

Active Publication Date: 2009-09-08
INTELLECTUAL VENTURES HOLDING 81 LLC
View PDF26 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0009]The present invention provides systems and methods for applying hard-real-time capabilities in software to software security. For example, the systems and methods of the present invention allow a programmer to attach a periodic integrity check to an application so that an attack on the application would need to succeed completely within a narrow and unpredictable time window in order to remain undetected.

Problems solved by technology

The security process will raise an alarm if it finds that the application code has been tampered with, if it finds that critical data structures do not have matching checksums, or if it detects that the application is not being scheduled at the required frequency.
If the challenge handler does not respond to the challenge within the predetermined time limit, then this is indication that the computer system may be compromised.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Systems and methods for detecting a security breach in a computer system
  • Systems and methods for detecting a security breach in a computer system
  • Systems and methods for detecting a security breach in a computer system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026]In the following description, for purposes of explanation and not limitation, specific details are set forth, such as particular systems, computers, devices, components, techniques, computer languages, storage techniques, software products and systems, operating systems, interfaces, hardware, etc. in order to provide a thorough understanding of the present invention. However, it will be apparent to one skilled in the art that the present invention may be practiced in other embodiments that depart from these specific details. Detailed descriptions of well-known systems, computers, devices, components, techniques, computer languages, storage techniques, software products and systems, operating systems, interfaces, and hardware are omitted so as not to obscure the description of the present invention.

[0027]FIG. 1 is a functional block diagram of a real-time computer system 100 having a hard real-time operating system 101. In some embodiments, hard, real-time operation system 101 ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides systems and methods for applying hard-real-time capabilities in software to software security. For example, the systems and methods of the present invention allow a programmer to attach a periodic integrity check to an application so that an attack on the application would need to succeed completely within a narrow and unpredictable time window in order to remain undetected.

Description

[0001]The present application claims the benefit of U.S. Provisional Patent Application No. 60 / 432,655, filed on Dec. 12, 2002, the entire contents of which are incorporated herein by this reference.BACKGROUND OF THE INVENTION[0002]1. Field of the Invention[0003]The present invention relates to systems and methods for detecting a security breach in a computer system.[0004]2. Discussion of the Background[0005]Standard methods for computer system security include passwords and other authorization tokens, use of encryption, and permission checking systems. In such standard methods, “security markers” (e.g., checksums, digital signatures, and permission levels) and “security properties” (e.g., an exact match between a data item that is supposed to be immutable and a hidden copy of that data item) can be used to validate the integrity of data and of the security system. However, all methods have flaws and costs. In practice, no security system is 100% effective.[0006]The “defense in dept...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(United States)
IPC IPC(8): G06F11/00G06F15/173G06F9/46G06F11/30G06F21/00
CPCG06F21/54G06F21/552G06F21/55G06F21/554G06F2221/2101G06F2221/2115G06F21/52G06F21/57G06F21/71G06F2221/2103G06F2221/2137Y04S40/20
Inventor YODAIKEN, VICTOR J.
Owner INTELLECTUAL VENTURES HOLDING 81 LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products